Sciweavers

2187 search results - page 338 / 438
» Providing Security Services in a Resource Discovery System
Sort
View
ACSAC
2007
IEEE
14 years 3 months ago
Retrofitting the IBM POWER Hypervisor to Support Mandatory Access Control
Server virtualization more readily enables the collocation of disparate workloads on a shared physical platform. When employed on systems across a data center, the result can be a...
Enriquillo Valdez, Reiner Sailer, Ronald Perez
EMSOFT
2005
Springer
14 years 2 months ago
Deeply embedded XML communication: towards an interoperable and seamless world
Current consumer electronics devices do not interoperate and are hard to use. Devices use proprietary, device-specific and inflexible protocols. Resources across device classes, s...
Johannes Helander
ASPLOS
2006
ACM
14 years 3 months ago
Geiger: monitoring the buffer cache in a virtual machine environment
Virtualization is increasingly being used to address server management and administration issues like flexible resource allocation, service isolation and workload migration. In a...
Stephen T. Jones, Andrea C. Arpaci-Dusseau, Remzi ...
WSE
2006
IEEE
14 years 3 months ago
Eliminating SQL Injection Attacks - A Transparent Defense Mechanism
The widespread adoption of web services as an instant means of information dissemination and various other transactions, has essentially made them a key component of today’s Int...
Muthusrinivasan Muthuprasanna, Ke Wei, Suraj Kotha...
DSN
2003
IEEE
14 years 2 months ago
Opportunity-Adaptive QoS Enhancement in Satellite Constellations: A Case Study
Systems that are formed by massively distributed mobile resources, such as satellite constellations, often provide mission-critical functions. However, many existing quality-of-se...
Ann T. Tai, Kam S. Tso, Leon Alkalai, Savio N. Cha...